Whether you realize it or not, your business is at risk.

With those numbers, if you haven’t already, it’s time to invest in a cybersecurity strategy.

What to be on the lookout for

Malware has taken on a number of incarnations over the years. Spearheading the modern era are point of sale (POS) Trojans, Banking Trojans, and Ransomware. Here’s a snapshot and definition of each:

POS Trojan. These cyber-spies zero in on electronic payment systems. A POS Trojan is capable of mining customer data such as debit and credit card numbers, both online, and in stores.

Banking Trojan. This nasty little collection penetrates and then lurks inside computer systems eagerly gathering up usernames and passwords, along with vulnerable banking data. One of such programs, Zeus, cracked into 3.6 million computers in the United States back in 2010.

Ransomware. Ransomware digital terrorists invade computer systems, pull sensitive information, and then lock it up in encryption. Under threat of publication, or permanent encryption, a ransom is then demanded.

How to protect your business from cyber thugs

While each of these threats is crippling, the following countermeasures can help business owners sleep better at night.

1). Know your enemy. It’s important to investigate which types of malware your industry faces most frequently. Understanding the threat is a productive first step toward security.

3). Implement a company cybersecurity policy. Everyone on your staff should be aware of security risks. Employees should be educated on the dangers of opening suspicious emails and attachments, which can introduce malware to the computer network. Of course, accidents can and do happen – your staff should also know what to do if they think they might have downloaded a threat.

4). Be password savvy. Another element employees should be aware of is which types of passwords are the most secure. While special characters are commonly thought to add security, long sentences – a minimum of 12 characters – can not only be easier to remember, they’re also secure.

5). Disconnect. The first response to a cyber threat is to cut off their path to your data. Shutting down the network – including Bluetooth and Wi-Fi – can hinder further infection and communication with the malware’s source.

6). Keep everything backed up. Hard drives crash, files get deleted, and then there’s ransomware. If you’re infected with a ransomware program, and you have a backup completely off your network it will limit their power over your company.

Implement and Enforce Policies

One area in which to be specifically diligent is the use of personal devices on your corporate network. The BYOD (Bring Your Own Device) trend is growing and policies must be put in-place and followed.

As with any good policy, one which targets BYOD must be written, clear, and comprehensive. While no one-size fits all, a good policy will address the concerns of the employee and the company. Read our blog from earlier this year on BYOD.